CN110602083B - Secure transmission and storage method of digital identity authentication data - Google Patents
Secure transmission and storage method of digital identity authentication data Download PDFInfo
- Publication number
- CN110602083B CN110602083B CN201910853716.9A CN201910853716A CN110602083B CN 110602083 B CN110602083 B CN 110602083B CN 201910853716 A CN201910853716 A CN 201910853716A CN 110602083 B CN110602083 B CN 110602083B
- Authority
- CN
- China
- Prior art keywords
- user
- data
- point
- digital identity
- container
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 21
- 238000000034 method Methods 0.000 title claims abstract description 11
- 238000013144 data compression Methods 0.000 claims abstract description 7
- 238000012545 processing Methods 0.000 claims abstract description 6
- 238000004364 calculation method Methods 0.000 claims description 6
- 238000013475 authorization Methods 0.000 abstract description 4
- 230000006399 behavior Effects 0.000 abstract description 3
- 230000008520 organization Effects 0.000 abstract description 3
- 238000007792 addition Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/04—Protocols for data compression, e.g. ROHC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Optimization (AREA)
- Mathematical Analysis (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a safe transmission and storage method of digital identity authentication data, a user carries out digital identity authentication through a client, and the digital identity data after the client authentication is encrypted by SM2 algorithm and then is directly transmitted to the blockchain network, the data is reorganized by data compression algorithm after the chain is up, the storage logic is executed, the personal data of the user is stored in the blockchain instead of the server, on the premise of no personal authorization, any organization or person can not obtain the data of the person, the existing information leakage and phishing behaviors are fundamentally solved, the safety of the data is ensured, the SM2 algorithm is adopted for encryption processing in the data transmission process, the sensitive information is not tampered in the transmission, and people without authentication and authorization can not see the original data, so that the confidentiality of the sensitive data in the digital identity authentication data transmission is realized.
Description
Technical Field
The invention belongs to the technical field of computer networks, relates to a network digital identity management system, and particularly relates to a secure transmission and storage method of digital identity authentication data
Background
When using some networking devices to perform more convenient and faster operations, the users need to go through the processes of registration, login, authentication, transmission and the like of various network identities. Now, the network identity of the people is basically in a real name system, and the important basic information of the people is contained in the network identity.
Identity authentication is also called as "identity verification" or "identity authentication", and refers to a process of confirming an identity of an operator in a computer and a computer network system, so as to determine whether the user has access and use rights to a certain resource, thereby enabling access policies of the computer and the network system to be reliably and effectively executed, preventing an attacker from impersonating a legitimate user to obtain the access rights of the resource, ensuring the security of the system and data, and authorizing the legitimate interests of the accessor.
In the prior art, data authenticated by a user through a client is encrypted after passing through a central server, so that tampering and embezzlement before data chaining can be caused, and block chain storage resources are consumed due to overlong data after asymmetric encryption.
Disclosure of Invention
The invention aims to provide a safe transmission and storage method of digital identity authentication data, which ensures the safety of the data, and adopts SM2 algorithm encryption processing in the data transmission process to ensure that sensitive information is not tampered in the transmission process.
The purpose of the invention can be realized by the following technical scheme:
a user carries out digital identity authentication through a client, and after the digital identity data which is authenticated by the client is encrypted through an SM2 algorithm, the digital identity data is directly transmitted to a block chain network, and after chain linking, the data is reorganized through a data compression algorithm, and storage logic is executed.
Further, the SM2 algorithm encryption processing comprises the following steps:
step S1, the user a selects an elliptic curve Ep (a, b) suitable for encryption, and takes a point G on the elliptic curve Ep (a, b) as a base point;
step S2, the user a selects a private key K and generates a corresponding public key K — kG;
step S3, the user A sends the elliptic curve Ep (a, B), the base point G and the public key K to the user B;
step S4, after receiving the information sent by the user A, the user B encodes the plaintext (M) to be transmitted to a point M on the elliptic curve Ep (a, B), generates a random integer r (r < n), and starts to encrypt;
in step S5, the user B performs calculation to obtain a point C1 and a point C2, where the point C1 is M + rK and the point C2 is rG;
step S6, the user B sends the point C1 and the point C2 to the user a;
in step S7, after receiving the information sent by the user B, the user a performs calculation C1-kC2 to obtain a point M, and finds a corresponding point M on the elliptic curve Ep (a, B) to obtain a plaintext (M) to be transmitted.
Further, the data compression algorithm comprises the steps of:
step T1, firstly, frequency statistics is carried out on the characters of the compressed file, and the characters-frequency are stored in a container m;
step T2, according to the frequency of each character, taking out the corresponding character of two minimum frequencies from the container m as two leaf nodes of the binary tree, taking the frequency sum as their root nodes, simultaneously storing the new node into the container m, and removing the old two nodes from the container m;
step T3, repeating step T2 until there is only one element in container m;
and step T4, marking the left node of the formed binary tree as 0 and the right node as 1, and stringing the 0 and 1 sequences encountered from the uppermost root node to the lowermost leaf node to obtain the codes of all the symbols.
The invention has the beneficial effects that: the invention provides a safe transmission and storage method of digital identity authentication data, which stores personal data of a user in a block chain instead of a server, under the premise of no personal authorization, any organization or individual cannot acquire the personal data, fundamentally solves the existing information leakage and network fraud behaviors, ensures the safety of the data, adopts SM2 algorithm encryption processing in the data transmission process, ensures that sensitive information is not tampered in transmission, and ensures that unauthenticated and authorized people cannot see the original data, thereby playing the role of keeping the sensitive data secret in the transmission of the digital identity authentication data.
Detailed Description
The technical solutions in the embodiments of the present invention are clearly and completely described below, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present invention, it is to be understood that the terms "opening," "upper," "lower," "thickness," "top," "middle," "length," "inner," "peripheral," and the like are used in an orientation or positional relationship that is merely for convenience in describing and simplifying the description, and do not indicate or imply that the referenced component or element must have a particular orientation, be constructed and operated in a particular orientation, and thus should not be considered as limiting the present invention.
The invention provides a safe transmission and storage method of digital identity authentication data, wherein a user carries out digital identity authentication through a client, the digital identity data which is authenticated at the client is directly transmitted to a block chain network after being encrypted through a SM2 algorithm, and the data is reorganized through a data compression algorithm after being linked up, so that storage logic is executed, and the redundancy and storage space of the data are reduced.
The SM2 algorithm encryption processing method comprises the following steps:
in step S1, the user a selects an elliptic curve Ep (a, b) suitable for encryption, such as y2=x3+ ax + b, and a point G on the elliptic curve Ep (a, b) is taken as a base point.
In step S2, user a selects a private key (private key PV) K and generates a corresponding public key (public key PB) K — kG.
In step S3, user a sends the elliptic curve Ep (a, B), the base point G, and the public key K to user B.
In step S4, after receiving the information sent by the user a, the user B encodes the plaintext (M) to be transmitted to a point M on the elliptic curve Ep (a, B), generates a random integer r (r < n), and starts encryption.
In step S5, the user B performs calculation to obtain a point C1 and a point C2, where the point C1 is M + rK and the point C2 is rG.
In step S6, user B sends Point C1 and Point C2 to user A.
In step S7, after receiving the information sent by the user B, the user a performs calculation of C1-kC2, so that the point M is obtained because C1-kC2 ═ M + rK-k (rg) ═ M + rK-r (kg) ═ M + rK-rK ═ M, and finds the corresponding point M on the elliptic curve Ep (a, B), so as to obtain the plaintext (M) to be transmitted.
The data compression algorithm comprises the following steps:
in step T1, the frequency statistics of the characters of the compressed file are first performed and stored in the container m in the form of "character-frequency".
And step T2, according to the frequency of each character, taking out the characters corresponding to the two minimum frequencies from the container m as two leaf nodes of the binary tree, taking the frequency sum as the root node of the two leaf nodes, simultaneously storing the new node into the container m, and removing the old two nodes from the container m. Wherein the container m may employ a priority queue.
Step T3, repeat step T2 until there is only one element in container m.
And step T4, marking the left node of the formed binary tree as 0 and the right node as 1, and stringing the 0 and 1 sequences encountered from the uppermost root node to the lowermost leaf node to obtain the codes of all the symbols.
The invention provides a safe transmission and storage method of digital identity authentication data, which stores personal data of a user in a block chain instead of a server, under the premise of no personal authorization, any organization or individual cannot acquire the personal data, fundamentally solves the existing information leakage and network fraud behaviors, ensures the safety of the data, adopts SM2 algorithm encryption processing in the data transmission process, ensures that sensitive information is not tampered in transmission, and ensures that unauthenticated and authorized people cannot see the original data, thereby playing the role of keeping the sensitive data secret in the transmission of the digital identity authentication data.
In the description herein, references to the description of "one embodiment," "an example," "a specific example" or the like are intended to mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The foregoing is merely exemplary and illustrative of the present invention and various modifications, additions and substitutions may be made by those skilled in the art to the specific embodiments described without departing from the scope of the invention as defined in the following claims.
Claims (1)
1. A safe transmission and storage method of digital identity authentication data is characterized in that a user carries out digital identity authentication through a client, the digital identity data which is authenticated at the client is directly transmitted to a block chain network after being encrypted through an SM2 algorithm, and the data is reorganized through a data compression algorithm after being linked up, and storage logic is executed;
the SM2 algorithm encryption processing comprises the following steps:
step S1, the user a selects an elliptic curve Ep (a, b) suitable for encryption, and takes a point G on the elliptic curve Ep (a, b) as a base point;
step S2, the user a selects a private key K and generates a corresponding public key K — kG;
step S3, the user A sends the elliptic curve Ep (a, B), the base point G and the public key K to the user B;
step S4, after receiving the information sent by the user A, the user B encodes the plaintext (M) to be transmitted to a point M on the elliptic curve Ep (a, B), generates a random integer r (r < n), and starts to encrypt;
in step S5, the user B performs calculation to obtain a point C1 and a point C2, where the point C1 is M + rK and the point C2 is rG;
step S6, the user B sends the point C1 and the point C2 to the user a;
step S7, after receiving the information sent by the user B, the user A obtains a point M by executing calculation C1-kC2, and finds a corresponding point M on the elliptic curve Ep (a, B) to obtain a plaintext (M) to be transmitted;
the data compression algorithm comprises the following steps:
step T1, firstly, frequency statistics is carried out on the characters of the compressed file, and the characters-frequency are stored in a container m;
step T2, according to the frequency of each character, taking out the corresponding character of two minimum frequencies from the container m as two leaf nodes of the binary tree, taking the frequency sum as their root nodes, simultaneously storing the new node into the container m, and removing the old two nodes from the container m;
step T3, repeating step T2 until there is only one element in container m;
and step T4, marking the left node of the formed binary tree as 0 and the right node as 1, and stringing the 0 and 1 sequences encountered from the uppermost root node to the lowermost leaf node to obtain the codes of all the symbols.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910853716.9A CN110602083B (en) | 2019-09-10 | 2019-09-10 | Secure transmission and storage method of digital identity authentication data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910853716.9A CN110602083B (en) | 2019-09-10 | 2019-09-10 | Secure transmission and storage method of digital identity authentication data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110602083A CN110602083A (en) | 2019-12-20 |
CN110602083B true CN110602083B (en) | 2022-04-29 |
Family
ID=68858523
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910853716.9A Active CN110602083B (en) | 2019-09-10 | 2019-09-10 | Secure transmission and storage method of digital identity authentication data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110602083B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111181945B (en) * | 2019-12-24 | 2022-03-04 | 达闼机器人有限公司 | Digital identity management method and device, storage medium and electronic equipment |
CN112131591A (en) * | 2020-09-29 | 2020-12-25 | 深圳壹账通智能科技有限公司 | Encryption method, device, device and medium for compressing ciphertext of information |
CN113098879B (en) * | 2021-04-06 | 2022-09-20 | 北京众享比特科技有限公司 | Method, system and block chain network for preventing back end from tampering uplink data |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106790253A (en) * | 2017-01-25 | 2017-05-31 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | Authentication method and device based on block chain |
CN107079037A (en) * | 2016-09-18 | 2017-08-18 | 深圳前海达闼云端智能科技有限公司 | Identity identifying method, device, node and system based on block chain |
WO2017145010A1 (en) * | 2016-02-23 | 2017-08-31 | nChain Holdings Limited | Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system |
CN107181765A (en) * | 2017-07-25 | 2017-09-19 | 光载无限(北京)科技有限公司 | Network digital identity identifying method based on block chain technology |
CN109617699A (en) * | 2019-01-16 | 2019-04-12 | 北京沃东天骏信息技术有限公司 | A key generation method, blockchain network service platform and storage medium |
CN109768864A (en) * | 2019-01-14 | 2019-05-17 | 大连大学 | Encryption Method Based on ECC and Homomorphic Encryption |
-
2019
- 2019-09-10 CN CN201910853716.9A patent/CN110602083B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017145010A1 (en) * | 2016-02-23 | 2017-08-31 | nChain Holdings Limited | Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system |
CN107079037A (en) * | 2016-09-18 | 2017-08-18 | 深圳前海达闼云端智能科技有限公司 | Identity identifying method, device, node and system based on block chain |
CN106790253A (en) * | 2017-01-25 | 2017-05-31 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | Authentication method and device based on block chain |
CN107181765A (en) * | 2017-07-25 | 2017-09-19 | 光载无限(北京)科技有限公司 | Network digital identity identifying method based on block chain technology |
CN109768864A (en) * | 2019-01-14 | 2019-05-17 | 大连大学 | Encryption Method Based on ECC and Homomorphic Encryption |
CN109617699A (en) * | 2019-01-16 | 2019-04-12 | 北京沃东天骏信息技术有限公司 | A key generation method, blockchain network service platform and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110602083A (en) | 2019-12-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Akhil et al. | Enhanced cloud data security using AES algorithm | |
WO2009062373A1 (en) | Method of implementing network genuine identification | |
CN110602083B (en) | Secure transmission and storage method of digital identity authentication data | |
CN109347626B (en) | A secure identity authentication method with anti-tracking feature | |
CN111464503A (en) | Network dynamic defense method, device and system based on random multi-dimensional transformation | |
CN109150906A (en) | A kind of real-time data communication safety method | |
CN114095229A (en) | Method, device and system for constructing data transmission protocol of energy Internet | |
Feiri et al. | Efficient and secure storage of private keys for pseudonymous vehicular communication | |
CN116614809A (en) | Wireless sensor network authentication protocol method based on physical unclonable function | |
CN106789845A (en) | A kind of method of network data security transmission | |
Castiglione et al. | An efficient and transparent one-time authentication protocol with non-interactive key scheduling and update | |
CN115865320A (en) | A blockchain-based security service management method and system | |
CN104734856A (en) | Password authentication method for preventing server-side information from being leaked | |
Chean et al. | Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing | |
Aiash | A formal analysis of authentication protocols for mobile devices in next generation networks | |
CN109246124B (en) | Active defense method for encrypted information | |
Sebbar et al. | BCDS-SDN: Privacy and Trusted Data Sharing Using Blockchain Based on a Software-Defined Network's Edge Computing Architecture | |
CN105681364B (en) | An anti-attack method for IPv6 mobile terminals based on enhanced binding | |
Kim et al. | Secure IoT Device Authentication Scheme using Key Hiding Technology | |
CN109450641A (en) | A kind of high-end die information management system access control method | |
CN105391723B (en) | A kind of hardware based multistage cryptographic key negotiation method | |
Sameni et al. | Analysis of Attacks in Authentication Protocol IEEE 802.16 e | |
Xingqi et al. | Cipher Based Data Security Sharing Scheme | |
Anh et al. | A Robust Authentication Technique for Client–Server Secure Login | |
CN119603079B (en) | Multi-system password security management method based on equipment authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |